Description: USBsploit v0.6b: PoC to generate Reverse TCP backdoors, running Auto[run|play]/[LNK|PDF|EXE] USB infections using wmic or railgun, but also dumping all USB files remotely on multiple targets at the same time and replaced all LNK, PDF and/or EXE files by malicious ones (custom embed, generic) on the USB targets. USBsploit works through Meterpreter sessions with a light ( 34MB - not Mini version ) modified version of Metasploit (v3.7.0-dev svn r12145). The interface is a mod of SET (The Social Engineering Toolkit). The Meterscript script usbsploit.rb of the USBsploit Framework can otherwise be used with the original Metasploit Framework. usbsploit.rb's also available under 3 split scripts (autorun_usbploit, replace_usbsploit.rb, autorun_usbsploit.rb). Everything can be downloaded on SecuObs ( http://secuobs.com ). Automatic or manual SVN updates can be done from previous versions and migration to a process on the target is now available
Tags: secuobs , usbsploit , meterpreter , metasploit , usb dump , autorun , toolkit , security , pentest , hacking , lnk , backdoor , payload exploitation , ruby , python , perl , vulnerability , flaw , windows , linux ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.